joshterrill / node-reverse-trojanLinks
An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.
☆16Updated 9 years ago
Alternatives and similar repositories for node-reverse-trojan
Users that are interested in node-reverse-trojan are comparing it to the libraries listed below
Sorting:
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 7 months ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 9 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆44Updated 9 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 4 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Updated 9 years ago
- a javascript keylogger included in a gif file☆38Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Reverse shell for remote administration☆30Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆49Updated 6 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55Updated 4 years ago
- A Tool for Impersonating CAPTCHA Providers☆17Updated 12 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago